Impact
A flaw in OpenClaw releases before 2026.4.8 enables attackers to trigger an approval-timeout fallback that circumvents the strictInlineEval explicit-approval checks on gateway and node exec hosts. The resulted bypass allows the execution of inline eval commands that would otherwise require user approval. This vulnerability is mapped to CWE-636, indicating improper validation of trust boundary conditions. The potential consequence is that an attacker who can trigger the timeout may run arbitrary code in the context of the gateway or node exec service, effectively compromising the affected host.
Affected Systems
All versions of the OpenClaw application prior to 2026.4.8 running on gateway or node exec hosts are vulnerable. The product is provided by the vendor OpenClaw and the affected releases include any build before the 2026.4.8 update.
Risk and Exploitability
The vulnerability carries a CVSS score of 7.7, reflecting a high severity level. No EPSS data is available, so the frequency of exploitation cannot be quantified. It is not listed in the CISA KEV catalog. The likely attack vector involves an attacker who can invoke a gateway or node exec operation that experiences an approval timeout, which is typically a scenario where the tool's approval mechanism is unable to obtain user input. Consequently, the attacker gains a pathway to execute arbitrary code on the target host.
OpenCVE Enrichment